Package "hostapd"
Name: |
hostapd
|
Description: |
IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP Authenticator
|
Latest version: |
2:2.9-1ubuntu4.3 |
Release: |
focal (20.04) |
Level: |
updates |
Repository: |
universe |
Head package: |
wpa |
Homepage: |
http://w1.fi/wpa_supplicant/ |
Links
Download "hostapd"
Other versions of "hostapd" in Focal
Changelog
wpa (2:2.9-1ubuntu4.3) focal-security; urgency=medium
* SECURITY UPDATE: DoS and possible code execution via P2P provision
discovery requests
- debian/patches/CVE-2021-27803.patch: fix a corner case in peer
addition based on PD Request in src/p2p/p2p_pd.c.
- CVE-2021-27803
-- Marc Deslauriers <email address hidden> Mon, 01 Mar 2021 08:44:39 -0500
|
Source diff to previous version |
CVE-2021-27803 |
A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could |
|
wpa (2:2.9-1ubuntu4.2) focal-security; urgency=medium
* SECURITY UPDATE: P2P discovery heap overflow
- debian/patches/CVE-2021-0326.patch: P2P: Fix copying of secondary
device types for P2P group client
- CVE-2021-0326
* SECURITY UPDATE: UPnP SUBSCRIBE misbehavior in WPS AP
- debian/patches/CVE-2020-12695-1.patch: WPS UPnP: Do not allow
event subscriptions with URLs to other networks
- debian/patches/CVE-2020-12695-2.patch: WPS UPnP: Fix event message
generation using a long URL path
- debian/patches/CVE-2020-12695-3.patch: WPS UPnP: Handle HTTP
initiation failures for events more properly
- CVE-2020-12695
-- Steve Beattie <email address hidden> Tue, 09 Feb 2021 22:29:47 -0800
|
Source diff to previous version |
CVE-2021-0326 |
In p2p_copy_client_info of p2p.c, there is a possible out of bounds wr ... |
CVE-2020-12695 |
The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on |
|
wpa (2:2.9-1ubuntu4.1) focal; urgency=medium
* debian/patches/git_roaming_interface.patch:
- backport upstream fix 'dbus: Move roam metrics to the correct
interface', should reduces the number of events (lp: #1879087)
* debian/NetworkManager/no-mac-addr-change.conf:
- remove configuration options that aren't needed and were copied to
the wrong section, fixes warnings in the log (lp: #1826639)
* debian/patches/Check-for-FT-support-when-selecting-FT-suites.patch:
- Backport upstream fix "Check for FT support when selecting FT suites"
to fix drivers without FT support, thanks Kai-Heng Feng (lp: #1881549)
-- Sebastien Bacher <email address hidden> Wed, 20 May 2020 13:01:53 +0200
|
1879087 |
dbus errors, frequent roaming and unstable connectivity |
1826639 |
wpasupplicant: unknown keys in no-mac-addr-change.conf |
1881549 |
BCM43602 [14e4:43ba] Subsystem [1028:0020]: Upgraded to 20.04 and wifi broke |
|
About
-
Send Feedback to @ubuntu_updates